Accepted author manuscript, 234 KB, PDF document
Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - A Multi-location Defence Scheme Against SSDP Reflection Attacks in the Internet of Things
AU - Liu, X.
AU - Zheng, L.
AU - Cao, S.
AU - Helal, S.
AU - Zhou, J.
AU - Jia, H.
AU - Zhang, W.
PY - 2019/12/31
Y1 - 2019/12/31
N2 - The proliferation of the Internet of Things (IoT) has led to a rapid increase in SSDP (Simple Service Discovery Protocol) reflection attacks. However, there is very scarce work on defending these attacks, with only some engineering advices on shutting down attacked services. This paper proposes a comprehensive approach to defend SSDP reflection attacks, which is called multi-location defence scheme (MLDS). MLDS operates at multiple places, working throughout the attacking link, starting from attack sources to victims, without prior detecting attacks. Attackers usually utilized bots in a botnet to launch attacks, but bots can act as defenders to carry out defence strategies in our MLDS, which is an unconventional approach to make the defence effective. Finally, we analyzed thoroughly packet traffic situations when deploying MLDS to different defence locations.
AB - The proliferation of the Internet of Things (IoT) has led to a rapid increase in SSDP (Simple Service Discovery Protocol) reflection attacks. However, there is very scarce work on defending these attacks, with only some engineering advices on shutting down attacked services. This paper proposes a comprehensive approach to defend SSDP reflection attacks, which is called multi-location defence scheme (MLDS). MLDS operates at multiple places, working throughout the attacking link, starting from attack sources to victims, without prior detecting attacks. Attackers usually utilized bots in a botnet to launch attacks, but bots can act as defenders to carry out defence strategies in our MLDS, which is an unconventional approach to make the defence effective. Finally, we analyzed thoroughly packet traffic situations when deploying MLDS to different defence locations.
U2 - 10.1007/978-981-15-1922-2_13
DO - 10.1007/978-981-15-1922-2_13
M3 - Conference contribution/Paper
SN - 9789811519215
VL - 1137 CCIS
T3 - Communications in Computer and Information Science
SP - 187
EP - 198
BT - Cyberspace Data and Intelligence, and Cyber-Living, Syndrome, and Health
A2 - Ning, Huansheng
ER -